Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transformation of a general 3D facial model to an actual scene face., , and . ICPR (3), page 75-78. IEEE, (1992)Robust Labeling Methods for Copy Protection of Images., , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 298-309. SPIE, (1997)Some aspects of error bounds in feature selection., and . Pattern Recognit., 11 (5-6): 353-360 (1979)KEYMEX: An expert system for the design of key management schemes., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 96-103. Springer, (1990)Weaknesses in Two Recent Lightweight RFID Authentication Protocols., , , , and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)Two-layer coding for videotelephone., , and . Signal Process. Image Commun., 5 (4): 295-303 (1993)A Novel Approach for Noise Reduction in the Gabor Time-frequency Domain., and . VISAPP (2), page 22-27. INSTICC Press, (2009)978-989-8111-69-2.A Modulated Parzen-Windows Approach for Probability Density Estimation., , and . IDA, volume 1280 of Lecture Notes in Computer Science, page 479-489. Springer, (1997)Feature Selection for Paintings Classification by Optimal Tree Pruning., , and . MRCS, volume 4105 of Lecture Notes in Computer Science, page 354-361. Springer, (2006)Models for Reasoning with Multiple Uncertainty in Expert Systems., , and . IPMU, volume 521 of Lecture Notes in Computer Science, page 377-392. Springer, (1990)